US20220083446A1 - Depicting Outcomes of a Decision - Google Patents

Depicting Outcomes of a Decision Download PDF

Info

Publication number
US20220083446A1
US20220083446A1 US17/536,051 US202117536051A US2022083446A1 US 20220083446 A1 US20220083446 A1 US 20220083446A1 US 202117536051 A US202117536051 A US 202117536051A US 2022083446 A1 US2022083446 A1 US 2022083446A1
Authority
US
United States
Prior art keywords
simulation
server
threat
permission
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/536,051
Inventor
David Gerard Ledet
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Open Invention Network LLC
Original Assignee
Open Invention Network LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Open Invention Network LLC filed Critical Open Invention Network LLC
Priority to US17/536,051 priority Critical patent/US20220083446A1/en
Publication of US20220083446A1 publication Critical patent/US20220083446A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/1093Calendar-based scheduling for persons or groups
    • G06Q10/1095Meeting or appointment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3457Performance evaluation by simulation
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/005Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 with correlation of navigation data from several sources, e.g. map or contour matching
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/20Instruments for performing navigational calculations
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/20Instruments for performing navigational calculations
    • G01C21/206Instruments for performing navigational calculations specially adapted for indoor navigation
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/26Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 specially adapted for navigation in a road network
    • G01C21/34Route searching; Route guidance
    • G01C21/36Input/output arrangements for on-board computers
    • G01C21/3626Details of the output of route guidance instructions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2358Change logging, detection, and notification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24564Applying rules; Deductive queries
    • G06F16/24565Triggers; Constraints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • G06F16/24578Query processing with adaptation to user needs using ranking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/60Information retrieval; Database structures therefor; File system structures therefor of audio data
    • G06F16/68Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/687Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using geographical or spatial information, e.g. location
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/93Document management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9536Search customisation based on social or collaborative filtering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L25/00Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
    • G10L25/48Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use
    • G10L25/51Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use for comparison or discrimination
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L67/26
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • G06K9/00221
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Definitions

  • This application generally pertains to the handling of threats in an environment and more specifically refers to the use of a simulation to depict possible outcomes of a threat prior to the threat occurring.
  • the current application builds upon the functionality introduced in a previous application that automatically targets content to online users.
  • the application offers A system and method for automatically targeting online users are provided.
  • a user performs an action that exhibits an interest in a product/service or performing a certain action, such as making a charitable contribution.
  • a user record is created in a user management system, such as a customer relationship management database.
  • the user record is augmented with additional data, such as data from a user profile, of the user, in a social network. Examples of such data include employer information, friend information, academic history, and job title.
  • the augmented user record is provided to a targeted content system that assigns the user to a nurture flow that includes multiple segments, each segment associated with actions to perform relative to the user, such as sending certain content to the user through one or more delivery channels.
  • the current functionality builds on this application by depicting on a device a scenario wherein the scenario is good or bad that may result according to an action or inaction.
  • the current application seeks to overcome the problem inherent in the notification of critical threats and overall notifications by depicting the outcome of ignoring the notice on the device's display.
  • An example operation may include a method comprising one or more of sending, by a device, a notification message to a server, when a threat is determined on a device, developing a simulation to spread awareness of a situation in response to the sending, requesting, by the server, a permission to present the simulation to the device, sending, by the device, a response message in response to the requesting, and executing the simulation, by the server, when permission is granted on the device.
  • Another example operation may include a system comprising a computing device that contains a processor and memory, wherein the processor is configured to perform send, by the computing device, a notification message to a server, when a threat is determined on the computing device, develop a simulation to spread awareness of a situation in response to the send, request, by the server, a permission to present the simulation to the device, send, by the device, a response message in response to the request, and execute the simulation, by the server, when permission is granted on the device.
  • a further example operation may include a non-transitory computer readable medium comprising instructions, that when read by a processor, cause the processor to perform sending, by a device, a notification message to a server, when a threat is determined on a device, developing a simulation to spread awareness of a situation in response to the sending, requesting, by the server, a permission to present the simulation to the device, sending, by the device, a response message in response to the requesting, and executing the simulation, by the server, when permission is granted on the device.
  • FIG. 1 is a system diagram in one embodiment of the present disclosure.
  • FIG. 2 is a block diagram of a computer system in one embodiment of the present disclosure.
  • FIG. 3 is a flowchart of the current functionality in one embodiment of the present disclosure.
  • FIG. 4 is one implementation of the transfer system depicting the network of the RFB protocol in one embodiment of the present disclosure.
  • FIG. 5 is a second flowchart in one embodiment of the present disclosure.
  • FIG. 6 is a sample message of a notice of simulation in one embodiment of the present disclosure.
  • FIG. 7 is a first screenshot of a possible simulation in one embodiment of the present disclosure.
  • FIG. 8 is a second screenshot of a possible simulation in one embodiment of the present disclosure.
  • FIG. 9 is a third screenshot of a possible simulation in one embodiment of the present disclosure.
  • FIG. 10 is a picture of the interior of a transport in one embodiment of the present disclosure.
  • messages may have been used in the description of embodiments, the application may be applied to many types of network data, such as, packet, frame, datagram, etc.
  • the term “message” also includes packet, frame, datagram, and any equivalents thereof.
  • certain types of messages and signaling may be depicted in exemplary embodiments they are not limited to a certain type of message, and the application is not limited to a certain type of signaling.
  • FIG. 1 illustrates a system diagram in one embodiments of the current application 100 in accordance with the present disclosure.
  • the client devices may be at least one of a mobile device 102 , a tablet 102 , a laptop device 102 c and/or a personal desktop computer 102 d.
  • the client device is communicably coupled to the network 104 , which is also communicably coupled to a system 106 .
  • a PDA personal digital assistant
  • an MP 3 player or any other wireless device
  • a gaming device such as a hand held system or home based system
  • any computer wearable device and the like (including a P.C. or other wired device) that may transmit and receive information
  • the client device may execute a user browser used to interface with the network 104 , an email application used to send and receive emails, a text application used to send and receive text messages, and many other types of applications. Communication may occur between the client device and the network 104 via applications executing on said device and may be applications downloaded via an application store or may reside on the client device by default. Additionally, communication may occur on the client device wherein the client device's operating system performs the logic to communicate without the use of either an inherent or downloaded application.
  • System 106 contains a server 108 communicably coupled to a database 110 .
  • the server 108 may also reside in a remote location coupled to the network 104 and may be redundant.
  • the database 110 may also be redundant and may be located outside of the system 106
  • FIG. 2 is a block diagram illustrating a computer system 200 upon which embodiments of the current invention may be implemented, for example.
  • the computer system 200 may include a bus 206 or other communication mechanism for communicating information, and a hardware processor 205 coupled with bus 206 for processing information.
  • Hardware processor 205 may be, for example, a general purpose microprocessor, for example.
  • Computer system 200 may also include main memory 208 , such as a random access memory (RAM) or other dynamic storage device, coupled to bus 206 for storing information and instructions to be executed by a processor 205 .
  • Main memory 208 also may be used for storing temporary variables or other intermediate information during the execution of instructions to be executed by a processor 205 .
  • Such instructions when stored in the non-transitory storage media accessible to processor 205 , may render computer system 200 into a special-purpose machine that is customized to perform the operations specified in the previously stored instructions.
  • Computer system 200 may also include a read only memory (ROM) 207 or other static storage device which is coupled to bus 206 for storing static information and instructions for processor 205 .
  • ROM read only memory
  • a storage device 209 such as a magnetic disk or optical disk, may be provided and coupled to bus 206 which stores information and instructions.
  • Computer system 200 may also be coupled via bus 206 to a display 212 , such as a cathode ray tube (CRT), a light-emitting diode (LED), etc. for displaying information to a computer user.
  • a display 212 such as a cathode ray tube (CRT), a light-emitting diode (LED), etc.
  • An input device 211 such as a keyboard, including alphanumeric and other keys, is coupled to bus 206 , which communicates information and command selections to processor 205 .
  • cursor control 210 such as a mouse, a trackball, or cursor direction keys which communicates direction information and command selections to processor 205 and controlling cursor movement on display 212 .
  • the techniques herein are performed by computer system 200 in response to a processor 205 executing one or more sequences of one or more instructions which may be contained in main memory 208 . These instructions may be read into main memory 208 from another storage medium, such as storage device 209 . Execution of the sequences of instructions contained in main memory 208 may cause processor 205 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry or embedded technology may be used in place of or in combination with software instructions.
  • Non-volatile media may include, for example, optical or magnetic disks, such as storage device 209 .
  • Volatile media may include dynamic memory, such as main memory 208 .
  • Common forms of storage media include, for example, a hard disk, solid state drive, magnetic tape, or other magnetic data storage medium, a CD-ROM, any other optical data storage medium, any physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, NVRAM, any other memory chip or cartridge.
  • the instructions may initially be carried on a magnetic disk or solid-state drive of a remote computer.
  • the remote computer may load the instructions into its dynamic memory and send the instructions over a medium such as the Internet 202 .
  • Computer system 200 may also include a communication interface 204 coupled to bus 206 .
  • the communication interface may provide two-way data communication coupling to a network link, which is connected to a local network 201 .
  • a network link typically provides data communication through one or more networks to other data devices.
  • the network link may provide a connection through local network 201 to data equipment operated by an Internet Service Provider (ISP) 202 .
  • ISP 202 provides data communication services through the worldwide packet data communication network now commonly referred to as the “Internet” 202 .
  • Internet 202 uses electrical, electromagnetic, or optical signals that carry digital data streams.
  • the signals through the various networks and the signals on network link and through communication interface 204 , carrying the digital data to and from computer system 200 are example forms of transmission media.
  • Computer system 200 can send messages and receive data, including program code, through the network(s) 202 , the network link, and the communication interface 204 .
  • a server 203 may transmit a requested code for an application program through Internet 202 , local network 201 and communication interface 204 .
  • Processor 205 can execute the received code as it is received, and/or stored in storage device 209 , or other non-volatile storage for execution at a later time.
  • a system and method is introduced wherein a user enters in information on a web page including the user's name, email address, social network identifier, etc.
  • a sales representative views the user's action, such as purchasing a product or service.
  • the user's information is augmented with additional information from social network(s) to assist the user's actions.
  • the current application builds upon the functionality introduced in the '544 application by depicting on a device a scenario wherein the scenario is good or bad that may result according to an action or inaction.
  • the current application seeks to overcome the problem inherent in the notification of critical threats and overall notifications by depicting the outcome of ignoring the notice on the device's display.
  • the content and notifications may be from an organization where they are employed, from organizations wherein computer programs and/or applications have been obtained, from organizations wherein operating systems are currently in use, or any other similar source.
  • IT Information Technology
  • Cyber Alert Level Indicator issued by the government provides an extreme example to depict a threat and possible ramifications of the threat:
  • Severity (Criticality+Lethality) ⁇ (System Countermeasures+Network Countermeasures) Criticality
  • Core services such as critical routers, firewalls, VPNs, IDS systems, DNS 4 E-mail, web, database and critical application servers. 3 Less critical application servers. 2 Business desktop systems. 1 Home users.
  • Restrictive i.e. deny all except what is allowed
  • Restrictive firewall 4 Restrictive firewall.
  • E-mail gateway filters common executable attachments.
  • 2 Permissive firewall i.e. “accept all but” or allowed service (e.g. HTTP, SMTP, etc.)
  • E-mail gateway does not filter any attachments.
  • FIG. 3 shows a flow of the overall functionality of the current application in one implementation 300 .
  • a threat or a potential threat is determined. This threat may be software in nature or a non-software related threat. Regardless of the type of threat, it is determined to utilize the current application to spread awareness of the situation 302 .
  • a simulation is developed 304 outside of the current application.
  • the simulation may be developed by the use of tools utilizing the tools presented herein, such as the Remote Framebuffer (RFB) protocol.
  • the simulation may involve the server such as server 108 obtaining control of the mouse pointer of the client 102 wherein control is temporarily removed from the user.
  • Other types of simulations are possible, an animated slide show designed in a slide generation program, an animation presentation depicting the scenario, a video presentation, a presentation of images in a slideshow presentation, etc.
  • An outside node creates the presentation and the stored presentation is accessible via the current application.
  • the simulation is developed and stored at the server 108 and/or the database 110 . This includes designing and producing a software-based presentation which may be an animation, video, audio, or a remote simulation where the simulation moves the device's pointing device such that it appears to the user that the device has been taken over by an outside entity, or the like.
  • a message is sent to the client device 102 of the proposed recipient of the simulation wherein the recipient may accept or deny the execution of the simulation. Acceptance or denial of the simulation may occur through the use of components on the notification, a choice of clickable links, or the like.
  • GUI component is used for the acceptance or denial of the request to execute the simulation, upon the clicking of a “Yes” component, such as button component, an event is thrown that is caught by a method that sends a response message to the server 108 .
  • the URL points to a file initiating the simulation wherein the file is stored on the server 108 , the database 110 , or another, remote file on a server coupled to the network 104 . If the link is selected 308 , the simulation begins 310 .
  • a response message is received at the server 108 in the scenario wherein a GUI component was utilized to allow a response to the initiation of the scenario in message1 wherein the response message contains data reflecting the positive or negative response of the proposal to execute a simulation on the device 102 .
  • the simulation begins 310 and the process ends. If the response is negative, the process ends.
  • Remote Framebuffer is a simple protocol for remote access to graphical user interfaces. Because it works at the framebuffer level it is applicable to all windowing systems and applications, including X11, Windows 3.1/95/NT and Macintosh.
  • FIG. 4 is one implementation of the transfer system depicting the network of the RFB protocol 400 .
  • the RFB client 402 is the remote endpoint receiving the input and may be a computer such as desktop computer, a laptop, a mobile device, or any device containing a processor and memory.
  • the RFB client is the computer that wants to control the remote computer.
  • the RFB client is stateless in nature allowing relatively easy implementation therein.
  • the RFB server 406 is the endpoint where changes to the framebuffer originate (i.e. the windowing system and applications).
  • the RFB server is the computer that has the image to send to the client(s).
  • the RGB protocol 404 allows the creation and sending of screenshots (images) to a remote user after compressing the image.
  • Use the Remote Framebuffer (RFB) protocol which utilizes an RFB server and RFB client.
  • the protocol also makes the client 402 stateless. If a client 402 disconnects from a server 406 and subsequently reconnects to that same server, the state of the user interface is pre-served. Furthermore, a different client endpoint can be used to connect to the same RFB server 406 . At the new endpoint, the user will see exactly the same graphical user interface as at the original endpoint. In effect, the interface to the user's applications becomes completely mobile.
  • the protocol allows for seamless interaction between multiple clients that have access to a network, such as network 104 .
  • the process of obtaining access to a client device 102 without the user's acknowledgement is a tangent from the proper software design. Permission must be given before another entity (e.g. the server 108 ) has the ability to control the device.
  • the current application seeks permission in the form of a first message sent to the device 102 wherein the user is made aware of the event that will unfold if permission is granted.
  • a GUI component such as a button that, when clicked on by the pointing device, sends a message to the server 108 wherein the simulation begins.
  • the pointing of the device is controlled by the current application executing on a device remotely located to the client device 102 , such as the server 108 .
  • the device e.g. server 108
  • the device may traverse:
  • the current application executing on the client device 102 listens for a connection on the Transmission Control Protocol/Internet Protocol (TCP/IP) port wherein the server 108 sends messages to the same port using a connection protocol such as via implementing the Socket class.
  • the application executing on the client device 102 receives these messages, parses them and provides the actions as specified in said messages, such as the movement of a pointer (e.g. mouse pointer), execution of a local or remote file (e.g. a simulation executable file, a video file, etc.), or other actions that are part of the simulation.
  • This method also entails implementing an encryption or an authorization function to avoid a 3 rd party controlling the device when sending unauthorized messages to the same port.
  • the current application creates a Remote Desktop Protocol (RDP) connection wherein the server 108 controls the device 102 via the RDP connection. While this is possible, it is a more involved solution and requires a deep level of authorization from the device.
  • RDP Remote Desktop Protocol
  • Another method is to build the current application executing on the client device 102 to accept Hypertext Transfer Protocol (HTTP) messages via the previously mentioned RDP protocol.
  • HTTP Hypertext Transfer Protocol
  • FIG. 5 shows a flow of the current application in one implementation of the current application 500 .
  • the server 108 sends message1 502 such as an email to the client device 102 .
  • the text in the message1 504 contains text in FIG. 6 , for example.
  • FIG. 6 shows the message 600 that introduces a simulation that will take effect upon an agreement accepted by the reader.
  • the reader must click the link: [Click Here] to invoke the simulation.
  • the reader may also ignore the message wherein the simulation will not occur.
  • the simulation involves the reception of a message, such as an email.
  • This message (message2) is the initial message of the simulation and is sent to the reader 506 , such as the client device 102 of the reader.
  • the simulation Upon reception of the second message, the simulation commences 508 on the client device 102 of the reader.
  • the simulation is created by the system 106 , more particularly the server 108 .
  • the simulation may be stored in database 110 , for example.
  • the simulation may involve the mouse pointer of the client device 102 taken control by the simulation or may be a video shown on the display of the client device.
  • the simulation depicts events that may occur if the threat is not attended to. This may include at least one of the following:
  • a propagation of a virus received in a message such as an email The simulation controls the pointing device on the client device 102 such that the pointing device moves over a link in a message and simulates a clicking on the link initiating the virus.
  • Images and/or videos in the simulation depict a computer that is infected wherein the computer access the person's contact list then copies the infected message and sends the message to other users within the organization without the user's knowledge.
  • This propagation may be visually depicted via the simulation wherein a birds-eye view of the organization is shown with all users in the organization reflected as a black dot. As the infection presents itself at each user, the dot becomes yellow as the virus engages with the computer then accesses their contact list and finally, at full infection, becomes red. This propagation expands until most if not all of the users within the organization are compromised.
  • FIG. 7 is a first screen shot of a possible simulation of one implementation of the current application 700 .
  • the simulation may incorporate animation wherein the progression of the simulation is fluid in nature.
  • the single red dot indicates the point of entry of the threat into the organization 702 .
  • the link initiating the thread has been invoked (e.g. by the clicking of a link for example), and the user's contacts have been accessed.
  • FIG. 8 is a second screen shot of a possible simulation of one implementation of the current application 800 .
  • the simulation depicts the spreading of the virus as indicated by the additional dotted lines, and the recipients as indicated by the 3 red dots.
  • the virus has been copied and spread 802 via the access to the initial user's contact list, for example.
  • FIG. 9 is a third and final screen shot of a possible simulation of one implementation of the current application 900 .
  • the simulation depicts the spreading of the virus as indicated by the additional red dots indicative of the virus having spread among many users in the organization.
  • the current application depicts a positive outcome resulting from decisions made. This embodiment covers the situation wherein an organization desires to relay the positive results from people in the organization paying attention to details that are easy to overlook, as they often become mundane tasks.
  • the current application depicts both positive and negative outcomes in a transport, based on a current situation.
  • the transport may be an automobile, airplane, train, bus, boat, or any type of transport that normally transports people from one place to another.
  • the current application executing in a device detects the current speed of the transport in a situation, such as traveling down an interstate road for example.
  • the transport computer is any device containing a processor and memory and may be integrated into a computing device in the transport.
  • the current speed is used to initiate the logic of the current application wherein if the transport is traveling a lower rate of speed, a simulation is presented to the user indicating positive aspects of traveling at a lower rate of speed, and if the transport is traveling at a higher rate of speed, a simulation is presented to the user indicating the possible critical outcomes of traveling at a high rate of speed.
  • the simulation shows pictures of a transport in a high-speed crash or shows a video of a person writing a transport insurance bill payment that reflects the bill after X number of speeding tickets, etc.
  • a picture is taken of the front of the transport via a camera mounted at the front of the transport as is normally used in today's market, then superimposed over that image is a picture of the user's transport crashed into that transport.
  • the superimposing of an image on another image is either performed at the transport computer, or remotely at a server such as server 108 wherein messaging occurs between the transport computer and the server through the network 104 .
  • the simulation shows calculations based on the average speed of the transport and a display of the amount of money saved on gasoline by traveling at a lower rate of speed. This calculation can be depicted per month, year and the savings obtained over a long period of time, such as a decade.
  • the transport computer interfaces with APIs of applications that allow the querying of current gasoline prices to determine the current gasoline price.
  • the transport computer calculates the amount of savings that may be incurred if the transport travels at a lower speed, such as 60 mph, then compares that value to the amount of gasoline used if the transport travels at a faster speed, such as 80 mph. This data is presented to the user via a display on the transport computer, for example.
  • the current application may easily determine the rate of speed via interaction with the transport's onboard computer, for example.
  • the simulation may be presented to the user on a Heads Up Display (HUD) device such that the user may continue to operate the transport while still pay some attention to the simulation.
  • HUD Heads Up Display
  • the simulation may be presented on a mobile device, such as the client device 102 wherein the communication between the transport computer and the client device is via Bluetooth, for example.
  • FIG. 10 is a picture of the interior of a transport in one implementation of the current application 1000 . There are 3 areas wherein the simulation may be presented to the driver of a transport.
  • the first location is the Heads Up Display (HUD) 1002 .
  • the simulation may be shown in the HUD, paying particular attention to the safety aspects of the simulation causing a disruption in the normal driving functionality for the user.
  • a notification is presented to the user wherein the user is required to either press a button to begin the simulation or press a button to dismiss the simulation.
  • the simulation is executed only when the transport is in park or traveling a low rate of speed, such as below 10 miles per hour.
  • the simulation may be presented in the transport's navigation/entertainment system 1004 .
  • the simulation may be presented on the user's client device, such as a mobile device 1006 .

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Remote Sensing (AREA)
  • Databases & Information Systems (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Security & Cryptography (AREA)
  • Automation & Control Theory (AREA)
  • Computational Linguistics (AREA)
  • Signal Processing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Quality & Reliability (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Health & Medical Sciences (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Human Computer Interaction (AREA)
  • Acoustics & Sound (AREA)
  • Library & Information Science (AREA)
  • Artificial Intelligence (AREA)
  • General Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)
  • User Interface Of Digital Computer (AREA)
  • Navigation (AREA)
  • Telephonic Communication Services (AREA)

Abstract

An example operation may include a method comprising one or more of sending, by a device, a notification message to a server, when a threat is determined on a device, developing a simulation to spread awareness of a situation in response to the sending, requesting, by the server, a permission to present the simulation to the device, sending, by the device, a response message in response to the requesting, and executing the simulation, by the server, when permission is granted on the device.

Description

    TECHNICAL FIELD
  • This application generally pertains to the handling of threats in an environment and more specifically refers to the use of a simulation to depict possible outcomes of a threat prior to the threat occurring.
  • BACKGROUND
  • The current application builds upon the functionality introduced in a previous application that automatically targets content to online users. The application offers A system and method for automatically targeting online users are provided. A user performs an action that exhibits an interest in a product/service or performing a certain action, such as making a charitable contribution. A user record is created in a user management system, such as a customer relationship management database. The user record is augmented with additional data, such as data from a user profile, of the user, in a social network. Examples of such data include employer information, friend information, academic history, and job title. The augmented user record is provided to a targeted content system that assigns the user to a nurture flow that includes multiple segments, each segment associated with actions to perform relative to the user, such as sending certain content to the user through one or more delivery channels.
  • The current functionality builds on this application by depicting on a device a scenario wherein the scenario is good or bad that may result according to an action or inaction.
  • As content and notifications are received, there is a need for the entity issuing the data to provide the proper level of notice to help the receivers understand the consequences of ignoring the data. Perhaps a user would take different actions if he/she understood the possible result from not paying attention to the notice.
  • The current application seeks to overcome the problem inherent in the notification of critical threats and overall notifications by depicting the outcome of ignoring the notice on the device's display.
  • SUMMARY
  • An example operation may include a method comprising one or more of sending, by a device, a notification message to a server, when a threat is determined on a device, developing a simulation to spread awareness of a situation in response to the sending, requesting, by the server, a permission to present the simulation to the device, sending, by the device, a response message in response to the requesting, and executing the simulation, by the server, when permission is granted on the device.
  • Another example operation may include a system comprising a computing device that contains a processor and memory, wherein the processor is configured to perform send, by the computing device, a notification message to a server, when a threat is determined on the computing device, develop a simulation to spread awareness of a situation in response to the send, request, by the server, a permission to present the simulation to the device, send, by the device, a response message in response to the request, and execute the simulation, by the server, when permission is granted on the device.
  • A further example operation may include a non-transitory computer readable medium comprising instructions, that when read by a processor, cause the processor to perform sending, by a device, a notification message to a server, when a threat is determined on a device, developing a simulation to spread awareness of a situation in response to the sending, requesting, by the server, a permission to present the simulation to the device, sending, by the device, a response message in response to the requesting, and executing the simulation, by the server, when permission is granted on the device.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a system diagram in one embodiment of the present disclosure.
  • FIG. 2 is a block diagram of a computer system in one embodiment of the present disclosure.
  • FIG. 3 is a flowchart of the current functionality in one embodiment of the present disclosure.
  • FIG. 4 is one implementation of the transfer system depicting the network of the RFB protocol in one embodiment of the present disclosure.
  • FIG. 5 is a second flowchart in one embodiment of the present disclosure.
  • FIG. 6 is a sample message of a notice of simulation in one embodiment of the present disclosure.
  • FIG. 7 is a first screenshot of a possible simulation in one embodiment of the present disclosure.
  • FIG. 8 is a second screenshot of a possible simulation in one embodiment of the present disclosure.
  • FIG. 9 is a third screenshot of a possible simulation in one embodiment of the present disclosure.
  • FIG. 10 is a picture of the interior of a transport in one embodiment of the present disclosure.
  • DETAILED DESCRIPTION
  • It will be readily understood that the instant components and/or steps, as generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of at least one of a method, system, component and non-transitory computer readable medium, as represented in the attached figures, is not intended to limit the scope of the application as claimed but is merely representative of selected embodiments.
  • The instant features, structures, or characteristics as described throughout this specification may be combined in any suitable manner in one or more embodiments. For example, the usage of the phrases “example embodiments”, “some embodiments”, or other similar language, throughout this specification refers to the fact that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment. Thus, appearances of the phrases “example embodiments”, “in some embodiments”, “in other embodiments”, or other similar language, throughout this specification do not necessarily all refer to the same group of embodiments, and the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
  • In addition, while the term “message” may have been used in the description of embodiments, the application may be applied to many types of network data, such as, packet, frame, datagram, etc. The term “message” also includes packet, frame, datagram, and any equivalents thereof. Furthermore, while certain types of messages and signaling may be depicted in exemplary embodiments they are not limited to a certain type of message, and the application is not limited to a certain type of signaling.
  • FIG. 1 illustrates a system diagram in one embodiments of the current application 100 in accordance with the present disclosure. There exist two main entities in the system diagram: a list of client devices 102 and a system 106. The client devices may be at least one of a mobile device 102, a tablet 102, a laptop device 102 c and/or a personal desktop computer 102 d. The client device is communicably coupled to the network 104, which is also communicably coupled to a system 106.
  • It should be noted that other types of devices might be used with the present application. For example, a PDA, an MP3 player, or any other wireless device, a gaming device (such as a hand held system or home based system), any computer wearable device, and the like (including a P.C. or other wired device) that may transmit and receive information may be used with the present application. The client device may execute a user browser used to interface with the network 104, an email application used to send and receive emails, a text application used to send and receive text messages, and many other types of applications. Communication may occur between the client device and the network 104 via applications executing on said device and may be applications downloaded via an application store or may reside on the client device by default. Additionally, communication may occur on the client device wherein the client device's operating system performs the logic to communicate without the use of either an inherent or downloaded application.
  • System 106 contains a server 108 communicably coupled to a database 110. Although not depicted herein, the server 108 may also reside in a remote location coupled to the network 104 and may be redundant. The database 110 may also be redundant and may be located outside of the system 106
  • FIG. 2 is a block diagram illustrating a computer system 200 upon which embodiments of the current invention may be implemented, for example. The computer system 200 may include a bus 206 or other communication mechanism for communicating information, and a hardware processor 205 coupled with bus 206 for processing information. Hardware processor 205 may be, for example, a general purpose microprocessor, for example.
  • Computer system 200 may also include main memory 208, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 206 for storing information and instructions to be executed by a processor 205. Main memory 208 also may be used for storing temporary variables or other intermediate information during the execution of instructions to be executed by a processor 205. Such instructions, when stored in the non-transitory storage media accessible to processor 205, may render computer system 200 into a special-purpose machine that is customized to perform the operations specified in the previously stored instructions.
  • Computer system 200 may also include a read only memory (ROM) 207 or other static storage device which is coupled to bus 206 for storing static information and instructions for processor 205. A storage device 209, such as a magnetic disk or optical disk, may be provided and coupled to bus 206 which stores information and instructions.
  • Computer system 200 may also be coupled via bus 206 to a display 212, such as a cathode ray tube (CRT), a light-emitting diode (LED), etc. for displaying information to a computer user. An input device 211 such as a keyboard, including alphanumeric and other keys, is coupled to bus 206, which communicates information and command selections to processor 205. Other type of user input devices may be present including cursor control 210, such as a mouse, a trackball, or cursor direction keys which communicates direction information and command selections to processor 205 and controlling cursor movement on display 212.
  • According to one embodiment, the techniques herein are performed by computer system 200 in response to a processor 205 executing one or more sequences of one or more instructions which may be contained in main memory 208. These instructions may be read into main memory 208 from another storage medium, such as storage device 209. Execution of the sequences of instructions contained in main memory 208 may cause processor 205 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry or embedded technology may be used in place of or in combination with software instructions.
  • The term “storage media” as used herein refers to any non-transitory media that may store data and/or instructions causing a machine to operation in a specific fashion. These storage media may comprise non-volatile media and/or volatile media. Non-volatile media may include, for example, optical or magnetic disks, such as storage device 209. Volatile media may include dynamic memory, such as main memory 208. Common forms of storage media include, for example, a hard disk, solid state drive, magnetic tape, or other magnetic data storage medium, a CD-ROM, any other optical data storage medium, any physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, NVRAM, any other memory chip or cartridge.
  • Various forms of media may be involved in the carrying one or more sequences of one or more of the instructions to processor 205 for execution. For example, the instructions may initially be carried on a magnetic disk or solid-state drive of a remote computer. The remote computer may load the instructions into its dynamic memory and send the instructions over a medium such as the Internet 202.
  • Computer system 200 may also include a communication interface 204 coupled to bus 206. The communication interface may provide two-way data communication coupling to a network link, which is connected to a local network 201.
  • A network link typically provides data communication through one or more networks to other data devices. For example, the network link may provide a connection through local network 201 to data equipment operated by an Internet Service Provider (ISP) 202. ISP 202 provides data communication services through the worldwide packet data communication network now commonly referred to as the “Internet” 202. Local network 201 and Internet 202 both use electrical, electromagnetic, or optical signals that carry digital data streams. The signals through the various networks and the signals on network link and through communication interface 204, carrying the digital data to and from computer system 200, are example forms of transmission media.
  • Computer system 200 can send messages and receive data, including program code, through the network(s) 202, the network link, and the communication interface 204. In the Internet example, a server 203 may transmit a requested code for an application program through Internet 202, local network 201 and communication interface 204.
  • Processor 205 can execute the received code as it is received, and/or stored in storage device 209, or other non-volatile storage for execution at a later time.
  • Every action or step described herein is fully and/or partially performed by at least one of any element depicted and/or described herein.
  • In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure. It will be apparent, however, that the present disclosure may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present disclosure. Modifiers such as “first”, “second”, and “third” may be used to differentiate elements, but the modifiers do not necessarily indicate any particular order. For example, a first party may be so named although, in reality, it may be a second, third, and/or fourth party.
  • In a US application 2016/0267544, henceforth referred to as the '544 application, a system and method is introduced wherein a user enters in information on a web page including the user's name, email address, social network identifier, etc. A sales representative views the user's action, such as purchasing a product or service. The user's information is augmented with additional information from social network(s) to assist the user's actions.
  • The current application builds upon the functionality introduced in the '544 application by depicting on a device a scenario wherein the scenario is good or bad that may result according to an action or inaction.
  • As content and notifications are received, there is a need for the entity issuing the data to provide the proper level of notice to help the receivers understand the consequences of ignoring the data. Perhaps a user would take different actions if he/she understood the possible result from not paying attention to the notice.
  • The current application seeks to overcome the problem inherent in the notification of critical threats and overall notifications by depicting the outcome of ignoring the notice on the device's display.
  • Computer users at an alarming pace in the today's technological environment receive different content and notifications. The content and notifications may be from an organization where they are employed, from organizations wherein computer programs and/or applications have been obtained, from organizations wherein operating systems are currently in use, or any other similar source.
  • It may be difficult for user of computers to ascertain the criticality of a given content or notification. Often, the ignoring of a notice does not bring about a consequence, especially a severe consequence, thus enhancing the possibility of ignoring future notices.
  • Information Technology (IT) organizations may become concerned that potentially critical threats are ignored such that the results of ignoring the threats may allow for great damage to a computer, a network, a user's identity, hardware, software, etc.
  • Different solutions are in place to describe a particular threat. For example, the Cyber Alert Level Indicator issued by the government provides an extreme example to depict a threat and possible ramifications of the threat:

  • Severity=(Criticality+Lethality)−(System Countermeasures+Network Countermeasures) Criticality
  • 5 Core services such as critical routers, firewalls, VPNs, IDS systems, DNS
    4 E-mail, web, database and critical application servers.
    3 Less critical application servers.
    2 Business desktop systems.
    1 Home users.
  • Lethality
  • 5 Exploit exists. Attacker could gain root or administrator privileges.
    4 Exploit exists. Attacker could gain user level access privileges.
    3 No known exploit exists. Attacker could gain root or administrator privileges.
    2 No known exploit exists. Attacker could gain user level access privileges.
    1 No known exploit exists. Attacker could not gain access.
  • System Countermeasures
  • 5 Current operating system with applicable patches applied.
    4 Current operating system with applicable patches applied.
    3 Current operating system with fairly up-to-date patches applied.
    2 Current operating system but missing some applicable patches.
    1 Older operating systems including Windows NT 3.51, Solaris 2.6, Windows 95/98/ME.
  • Network Countermeasures
  • 5 Restrictive (i.e. deny all except what is allowed) firewall.
    4 Restrictive firewall.
    3 Restrictive firewall. E-mail gateway filters common executable attachments.
    2 Permissive firewall (i.e. “accept all but”) or allowed service (e.g. HTTP, SMTP, etc.)
    1 No firewall implemented. E-mail gateway does not filter any attachments.
  • Alert Indicator—Severity −8 to −5 Green −4 to −2 Blue −1 to +2 Yellow +3 to +5 Orange +6 to +8 Red
  • FIG. 3 shows a flow of the overall functionality of the current application in one implementation 300. A threat or a potential threat is determined. This threat may be software in nature or a non-software related threat. Regardless of the type of threat, it is determined to utilize the current application to spread awareness of the situation 302.
  • In one embodiment, a simulation is developed 304 outside of the current application. The simulation may be developed by the use of tools utilizing the tools presented herein, such as the Remote Framebuffer (RFB) protocol. The simulation may involve the server such as server 108 obtaining control of the mouse pointer of the client 102 wherein control is temporarily removed from the user. Other types of simulations are possible, an animated slide show designed in a slide generation program, an animation presentation depicting the scenario, a video presentation, a presentation of images in a slideshow presentation, etc. An outside node creates the presentation and the stored presentation is accessible via the current application. The simulation is developed and stored at the server 108 and/or the database 110. This includes designing and producing a software-based presentation which may be an animation, video, audio, or a remote simulation where the simulation moves the device's pointing device such that it appears to the user that the device has been taken over by an outside entity, or the like.
  • A message is sent to the client device 102 of the proposed recipient of the simulation wherein the recipient may accept or deny the execution of the simulation. Acceptance or denial of the simulation may occur through the use of components on the notification, a choice of clickable links, or the like.
  • If a GUI component is used for the acceptance or denial of the request to execute the simulation, upon the clicking of a “Yes” component, such as button component, an event is thrown that is caught by a method that sends a response message to the server 108.
  • If a URL link was provided in the message to initiate the simulation, the URL points to a file initiating the simulation wherein the file is stored on the server 108, the database 110, or another, remote file on a server coupled to the network 104. If the link is selected 308, the simulation begins 310.
  • A response message is received at the server 108 in the scenario wherein a GUI component was utilized to allow a response to the initiation of the scenario in message1 wherein the response message contains data reflecting the positive or negative response of the proposal to execute a simulation on the device 102.
  • If the response is positive 308, the simulation begins 310 and the process ends. If the response is negative, the process ends.
  • Technology exists that allows a user to display information on or to control another person's computing device. Some of the technologies are depicted herein, but one versed on computer design and development will be able to design other solutions while arriving at the same experience without deviating from the scope of the current application.
  • Remote Framebuffer (RFB) is a simple protocol for remote access to graphical user interfaces. Because it works at the framebuffer level it is applicable to all windowing systems and applications, including X11, Windows 3.1/95/NT and Macintosh.
  • FIG. 4 is one implementation of the transfer system depicting the network of the RFB protocol 400.
  • The RFB client 402 is the remote endpoint receiving the input and may be a computer such as desktop computer, a laptop, a mobile device, or any device containing a processor and memory. The RFB client is the computer that wants to control the remote computer. The RFB client is stateless in nature allowing relatively easy implementation therein.
  • The RFB server 406 is the endpoint where changes to the framebuffer originate (i.e. the windowing system and applications). The RFB server is the computer that has the image to send to the client(s).
  • The RGB protocol 404 allows the creation and sending of screenshots (images) to a remote user after compressing the image. Use the Remote Framebuffer (RFB) protocol, which utilizes an RFB server and RFB client. The protocol also makes the client 402 stateless. If a client 402 disconnects from a server 406 and subsequently reconnects to that same server, the state of the user interface is pre-served. Furthermore, a different client endpoint can be used to connect to the same RFB server 406. At the new endpoint, the user will see exactly the same graphical user interface as at the original endpoint. In effect, the interface to the user's applications becomes completely mobile. The protocol allows for seamless interaction between multiple clients that have access to a network, such as network 104.
  • Above all, the process of obtaining access to a client device 102 without the user's acknowledgement is a tangent from the proper software design. Permission must be given before another entity (e.g. the server 108) has the ability to control the device.
  • For this reason, the current application seeks permission in the form of a first message sent to the device 102 wherein the user is made aware of the event that will unfold if permission is granted.
  • As mentioned herein, there are at least two methods discussed that allow the device to acknowledge the simulation and provide verification that the simulation may proceed:
  • A URL link that is associated with a file such that the simulation is initiated.
  • A GUI component such as a button that, when clicked on by the pointing device, sends a message to the server 108 wherein the simulation begins.
  • In either of the above cases, and those implemented that as similar to the above, it is assumed that permission is granted for a remote entity to (temporarily) control the device 102.
  • In one embodiment, the pointing of the device is controlled by the current application executing on a device remotely located to the client device 102, such as the server 108.
  • To take control of the remote device, there are multiple paths of development wherein the device (e.g. server 108) may traverse:
  • The current application executing on the client device 102 listens for a connection on the Transmission Control Protocol/Internet Protocol (TCP/IP) port wherein the server 108 sends messages to the same port using a connection protocol such as via implementing the Socket class. The application executing on the client device 102 receives these messages, parses them and provides the actions as specified in said messages, such as the movement of a pointer (e.g. mouse pointer), execution of a local or remote file (e.g. a simulation executable file, a video file, etc.), or other actions that are part of the simulation. This method also entails implementing an encryption or an authorization function to avoid a 3rd party controlling the device when sending unauthorized messages to the same port.
  • The current application creates a Remote Desktop Protocol (RDP) connection wherein the server 108 controls the device 102 via the RDP connection. While this is possible, it is a more involved solution and requires a deep level of authorization from the device.
  • Another method is to build the current application executing on the client device 102 to accept Hypertext Transfer Protocol (HTTP) messages via the previously mentioned RDP protocol.
  • FIG. 5 shows a flow of the current application in one implementation of the current application 500. The server 108 sends message1 502 such as an email to the client device 102. The text in the message1 504 contains text in FIG. 6, for example.
  • FIG. 6 shows the message 600 that introduces a simulation that will take effect upon an agreement accepted by the reader. The reader must click the link: [Click Here] to invoke the simulation. The reader may also ignore the message wherein the simulation will not occur.
  • If the reader accepted the simulation by clicking on the link 600, then a response is sent to the server 108. If the reader chooses, message1 is ignored or deleted wherein no further processing is performed.
  • In one embodiment, the simulation involves the reception of a message, such as an email. This message (message2) is the initial message of the simulation and is sent to the reader 506, such as the client device 102 of the reader.
  • Upon reception of the second message, the simulation commences 508 on the client device 102 of the reader.
  • The simulation is created by the system 106, more particularly the server 108. The simulation may be stored in database 110, for example. The simulation may involve the mouse pointer of the client device 102 taken control by the simulation or may be a video shown on the display of the client device.
  • In one embodiment, the simulation depicts events that may occur if the threat is not attended to. This may include at least one of the following:
  • a propagation of a virus received in a message such as an email. The simulation controls the pointing device on the client device 102 such that the pointing device moves over a link in a message and simulates a clicking on the link initiating the virus. Images and/or videos in the simulation depict a computer that is infected wherein the computer access the person's contact list then copies the infected message and sends the message to other users within the organization without the user's knowledge. This propagation may be visually depicted via the simulation wherein a birds-eye view of the organization is shown with all users in the organization reflected as a black dot. As the infection presents itself at each user, the dot becomes yellow as the virus engages with the computer then accesses their contact list and finally, at full infection, becomes red. This propagation expands until most if not all of the users within the organization are compromised.
  • a propagation of organizational trade secrets such as the effect of the current organization's falling stock price, images of headlines depicting internal trading, falling profit margins due to a lack of loyalty from the market, etc.
  • a depiction of the outcome of lower sales from a product such as a software product because of a bug that was released into the market causing a major glitch in the system, such as in the billing code.
  • The above list provides examples of the simulations with the understanding that any organization will be able to utilize the current application to shed light, in a visceral technique, to an increasing insensitivity to threats, or the lack of daily adherence to quality in the job/product at hand.
  • FIG. 7 is a first screen shot of a possible simulation of one implementation of the current application 700. The simulation may incorporate animation wherein the progression of the simulation is fluid in nature.
  • The single red dot indicates the point of entry of the threat into the organization 702. The link initiating the thread has been invoked (e.g. by the clicking of a link for example), and the user's contacts have been accessed.
  • FIG. 8 is a second screen shot of a possible simulation of one implementation of the current application 800. The simulation depicts the spreading of the virus as indicated by the additional dotted lines, and the recipients as indicated by the 3 red dots.
  • The virus has been copied and spread 802 via the access to the initial user's contact list, for example.
  • FIG. 9 is a third and final screen shot of a possible simulation of one implementation of the current application 900. The simulation depicts the spreading of the virus as indicated by the additional red dots indicative of the virus having spread among many users in the organization.
  • In another embodiment, the current application depicts a positive outcome resulting from decisions made. This embodiment covers the situation wherein an organization desires to relay the positive results from people in the organization paying attention to details that are easy to overlook, as they often become mundane tasks.
  • By initiating a simulation via the current application, it is possible to remind people in the organization that their everyday tasks are rewarded by elements that may not be reflected upon in their day-to-day environments.
  • For example, if an organization is seeking compliance from an authorized entity, such as ISO 9000 certification, the compliance needs often require conformance to detailed standards such as detailed document keeping, proving quality management standards. These requirements often are reluctantly maintained by personnel such that, after a period of time, the overall need of the requirement may be lost.
  • The current application may be used to remind the organization of the positive effects of compliance to a standard through the simulation showing positive results such as:
  • An increased in positive customer relations
  • An increased stock price
  • Additional customers via word of mouth
  • Less attrition
  • An increase in employee satisfaction
  • A greater chance of pay increases and mobility within the organization
  • Etc.
  • Other scenarios may easily be thought of and implemented through the depiction of both positive and negative results from actions and/or inactions of people within an organization without deviating from the scope of the current application.
  • As another embodiment, the current application depicts both positive and negative outcomes in a transport, based on a current situation.
  • The transport may be an automobile, airplane, train, bus, boat, or any type of transport that normally transports people from one place to another.
  • For example, the current application executing in a device, henceforth referred to as the transport computer inside the transport such as part of the navigation system, the entertainment system, or as a new computing device detects the current speed of the transport in a situation, such as traveling down an interstate road for example. The transport computer is any device containing a processor and memory and may be integrated into a computing device in the transport.
  • The current speed is used to initiate the logic of the current application wherein if the transport is traveling a lower rate of speed, a simulation is presented to the user indicating positive aspects of traveling at a lower rate of speed, and if the transport is traveling at a higher rate of speed, a simulation is presented to the user indicating the possible critical outcomes of traveling at a high rate of speed.
  • For example, the simulation shows pictures of a transport in a high-speed crash or shows a video of a person writing a transport insurance bill payment that reflects the bill after X number of speeding tickets, etc.
  • In another embodiment, a picture is taken of the front of the transport via a camera mounted at the front of the transport as is normally used in today's market, then superimposed over that image is a picture of the user's transport crashed into that transport. The superimposing of an image on another image is either performed at the transport computer, or remotely at a server such as server 108 wherein messaging occurs between the transport computer and the server through the network 104.
  • As another example, the simulation shows calculations based on the average speed of the transport and a display of the amount of money saved on gasoline by traveling at a lower rate of speed. This calculation can be depicted per month, year and the savings obtained over a long period of time, such as a decade. The transport computer interfaces with APIs of applications that allow the querying of current gasoline prices to determine the current gasoline price. The transport computer then calculates the amount of savings that may be incurred if the transport travels at a lower speed, such as 60 mph, then compares that value to the amount of gasoline used if the transport travels at a faster speed, such as 80 mph. This data is presented to the user via a display on the transport computer, for example.
  • The current application may easily determine the rate of speed via interaction with the transport's onboard computer, for example.
  • In another embodiment, the simulation may be presented to the user on a Heads Up Display (HUD) device such that the user may continue to operate the transport while still pay some attention to the simulation.
  • In another embodiment, the simulation may be presented on a mobile device, such as the client device 102 wherein the communication between the transport computer and the client device is via Bluetooth, for example.
  • FIG. 10 is a picture of the interior of a transport in one implementation of the current application 1000. There are 3 areas wherein the simulation may be presented to the driver of a transport.
  • The first location is the Heads Up Display (HUD) 1002. The simulation may be shown in the HUD, paying particular attention to the safety aspects of the simulation causing a disruption in the normal driving functionality for the user.
  • In one embodiment, a notification is presented to the user wherein the user is required to either press a button to begin the simulation or press a button to dismiss the simulation.
  • In another embodiment, the simulation is executed only when the transport is in park or traveling a low rate of speed, such as below 10 miles per hour.
  • Additionally, the simulation may be presented in the transport's navigation/entertainment system 1004. Finally, the simulation may be presented on the user's client device, such as a mobile device 1006.

Claims (20)

What is claimed is:
1. A method, comprising:
developing a simulation to spread awareness of a threat associated with a device;
determining, by a server, whether a response message is received from the device responsive to a request for permission to present the simulation to the device; and
executing the simulation, by the server, responsive to a received response granting permission on the device, where the simulation utilizes a Remote Framebuffer (RFB) protocol and remotely controls a pointing device of the device to initiate execution of the threat on the device.
2. The method of claim 1, wherein the simulation includes taking control of the device, via the server.
3. The method of claim 2, wherein the mouse and keyboard inputs are controlled by the simulation.
4. The method of claim 1, wherein the simulation includes displaying one or more of an animated presentation, a video presentation, and an image presentation.
5. The method of claim 1, wherein data of the requesting includes one or more of a URL link, and GUI components.
6. The method of claim 1, wherein the simulation, by the server, displays the simulation on the device.
7. The method of claim 1, wherein the simulation includes data that simulates possible outcomes if the threat is not halted.
8. A system, comprising:
a processor; and
a memory storing instructions which when executed by the processor cause the processor to perform a method comprising:
develop a simulation to spread awareness of a threat associated with a device;
determine, by a server, whether a response message is received from the device responsive to a request for permission to present the simulation to the device; and
execute the simulation, by the server, responsive to a received response that grants permission on the device, where the simulation utilizes a Remote Framebuffer (RFB) protocol and remotely controls a pointing device of the device to initiate execution of the threat on the device.
9. The system of claim 8, wherein the server is configured to take control of the device.
10. The system of claim 11, wherein the mouse and keyboard inputs are controlled by the simulation.
11. The system of claim 18, wherein the server is configured to display one or more of an animated presentation, a video presentation, and an image presentation.
12. The system of claim 8, wherein data of the request includes one or more of a URL link, and GUI components.
13. The system of claim 8, wherein the simulation, by the server, displays the simulation on the device.
14. The system of claim 8, wherein the simulation includes data that simulates outcomes when the threat is not halted.
15. A non-transitory computer readable medium comprising instructions, that when read by a processor, cause the processor to perform:
developing a simulation to spread awareness of a threat associated with a device;
determining, by a server, whether a response message is received from the device responsive to a request for permission to present the simulation to the device; and
executing the simulation, by the server, responsive to a received response granting permission on the device, where the simulation utilizes a Remote Framebuffer (RFB) protocol and remotely controls a pointing device of the device to initiate execution of the threat on the device.
16. The non-transitory computer readable medium of claim 15, wherein the simulation includes one or more of taking control of the device, via the server, wherein the mouse and keyboard inputs are controlled by the simulation, and displaying one or more of an animated presentation, a video presentation, and an image presentation.
17. The non-transitory computer readable medium of claim 15, wherein data of the requesting includes one or more of a URL link, and GUI components.
18. The non-transitory computer readable medium of claim 15, wherein the simulation, by the server, displays the simulation on the device.
19. The method of claim 1, wherein the executing the simulation comprises remotely controlling the pointing device of the device to click on a component that causes a simulated virus to launch on the device.
20. The method of claim 1, wherein the executing the simulation further comprises displaying an identification of another device that is infected by the threat as a result of the simulation on the device.
US17/536,051 2018-05-28 2021-11-28 Depicting Outcomes of a Decision Abandoned US20220083446A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/536,051 US20220083446A1 (en) 2018-05-28 2021-11-28 Depicting Outcomes of a Decision

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201862677144P 2018-05-28 2018-05-28
US16/442,901 US11216354B2 (en) 2018-05-28 2019-06-17 Depicting outcomes of a decision
US17/536,051 US20220083446A1 (en) 2018-05-28 2021-11-28 Depicting Outcomes of a Decision

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US16/442,901 Continuation US11216354B2 (en) 2018-05-28 2019-06-17 Depicting outcomes of a decision

Publications (1)

Publication Number Publication Date
US20220083446A1 true US20220083446A1 (en) 2022-03-17

Family

ID=68614507

Family Applications (6)

Application Number Title Priority Date Filing Date
US16/442,778 Abandoned US20190360815A1 (en) 2018-05-28 2019-06-17 Audio aided navigation
US16/442,804 Abandoned US20190362318A1 (en) 2018-05-28 2019-06-17 Audio-based notifications
US16/442,878 Abandoned US20200026696A1 (en) 2018-05-28 2019-06-17 Content attributes depicted in a social network
US16/442,901 Active 2040-03-13 US11216354B2 (en) 2018-05-28 2019-06-17 Depicting outcomes of a decision
US16/442,843 Abandoned US20200026742A1 (en) 2018-05-28 2019-06-17 Integrating communications into a social graph
US17/536,051 Abandoned US20220083446A1 (en) 2018-05-28 2021-11-28 Depicting Outcomes of a Decision

Family Applications Before (5)

Application Number Title Priority Date Filing Date
US16/442,778 Abandoned US20190360815A1 (en) 2018-05-28 2019-06-17 Audio aided navigation
US16/442,804 Abandoned US20190362318A1 (en) 2018-05-28 2019-06-17 Audio-based notifications
US16/442,878 Abandoned US20200026696A1 (en) 2018-05-28 2019-06-17 Content attributes depicted in a social network
US16/442,901 Active 2040-03-13 US11216354B2 (en) 2018-05-28 2019-06-17 Depicting outcomes of a decision
US16/442,843 Abandoned US20200026742A1 (en) 2018-05-28 2019-06-17 Integrating communications into a social graph

Country Status (1)

Country Link
US (6) US20190360815A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10565403B1 (en) * 2018-09-12 2020-02-18 Atlassian Pty Ltd Indicating sentiment of text within a graphical user interface
US11644330B2 (en) * 2020-07-08 2023-05-09 Rivian Ip Holdings, Llc Setting destinations in vehicle navigation systems based on image metadata from portable electronic devices and from captured images using zero click navigation
US11848655B1 (en) * 2021-09-15 2023-12-19 Amazon Technologies, Inc. Multi-channel volume level equalization based on user preferences
WO2023133172A1 (en) * 2022-01-05 2023-07-13 Apple Inc. User tracking headrest audio control

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080055305A1 (en) * 2006-08-31 2008-03-06 Kent State University System and methods for multi-dimensional rendering and display of full volumetric data sets
US20100027896A1 (en) * 2006-06-28 2010-02-04 Amir Geva Automated application interaction using a virtual operator
US8091065B2 (en) * 2007-09-25 2012-01-03 Microsoft Corporation Threat analysis and modeling during a software development lifecycle of a software application
US20130142365A1 (en) * 2011-12-01 2013-06-06 Richard T. Lord Audible assistance
US20130144603A1 (en) * 2011-12-01 2013-06-06 Richard T. Lord Enhanced voice conferencing with history
US20140199664A1 (en) * 2011-04-08 2014-07-17 Wombat Security Technologies, Inc. Mock attack cybersecurity training system and methods
US8955109B1 (en) * 2010-04-30 2015-02-10 Symantec Corporation Educating computer users concerning social engineering security threats
US20150295948A1 (en) * 2012-10-23 2015-10-15 Suzanne P. Hassell Method and device for simulating network resiliance against attacks
US20160036829A1 (en) * 2014-08-01 2016-02-04 Wombat Security Technologies, Inc. Cybersecurity training system with automated application of branded content
US9473522B1 (en) * 2015-04-20 2016-10-18 SafeBreach Ltd. System and method for securing a computer system against malicious actions by utilizing virtualized elements
US20170034205A1 (en) * 2015-07-31 2017-02-02 Siemens Corporation System and Method for Cyber-Physical Security
US20170103674A1 (en) * 2011-04-08 2017-04-13 Wombat Security Technologies, Inc. Mock Attack Cybersecurity Training System and Methods
US20170244746A1 (en) * 2011-04-08 2017-08-24 Wombat Security Technologies, Inc. Assessing Security Risks of Users in a Computing Network
US20170270077A1 (en) * 2014-09-25 2017-09-21 Huawei Technologies Co., Ltd. A server for providing a graphical user interface to a client and a client
US20180124051A1 (en) * 2016-07-14 2018-05-03 Huawei Technologies Co., Ltd. Response Method and System in Virtual Network Computing Authentication, and Proxy Server
US20180190146A1 (en) * 2016-12-30 2018-07-05 Fortinet, Inc. Proactive network security assesment based on benign variants of known threats
US20180233139A1 (en) * 2017-02-14 2018-08-16 Microsoft Technology Licensing, Llc Intelligent digital assistant system
US20190155916A1 (en) * 2017-11-22 2019-05-23 Facebook, Inc. Retrieving Content Objects Through Real-time Query-Post Association Analysis on Online Social Networks
US20190171822A1 (en) * 2017-12-01 2019-06-06 KnowBe4, Inc. Systems and methods for aida campaign controller intelligent records
US20190341055A1 (en) * 2018-05-07 2019-11-07 Microsoft Technology Licensing, Llc Voice identification enrollment
US20190347585A1 (en) * 2018-05-09 2019-11-14 Microsoft Technology Licensing, Llc Increasing usage for a software service through automated workflows

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100027896A1 (en) * 2006-06-28 2010-02-04 Amir Geva Automated application interaction using a virtual operator
US20080055305A1 (en) * 2006-08-31 2008-03-06 Kent State University System and methods for multi-dimensional rendering and display of full volumetric data sets
US8091065B2 (en) * 2007-09-25 2012-01-03 Microsoft Corporation Threat analysis and modeling during a software development lifecycle of a software application
US8955109B1 (en) * 2010-04-30 2015-02-10 Symantec Corporation Educating computer users concerning social engineering security threats
US20170244746A1 (en) * 2011-04-08 2017-08-24 Wombat Security Technologies, Inc. Assessing Security Risks of Users in a Computing Network
US20170140663A1 (en) * 2011-04-08 2017-05-18 Wombat Security Technologies, Inc. Context-aware cybersecurity training systems, apparatuses, and methods
US20140199664A1 (en) * 2011-04-08 2014-07-17 Wombat Security Technologies, Inc. Mock attack cybersecurity training system and methods
US20170103674A1 (en) * 2011-04-08 2017-04-13 Wombat Security Technologies, Inc. Mock Attack Cybersecurity Training System and Methods
US20130142365A1 (en) * 2011-12-01 2013-06-06 Richard T. Lord Audible assistance
US20130144603A1 (en) * 2011-12-01 2013-06-06 Richard T. Lord Enhanced voice conferencing with history
US20150295948A1 (en) * 2012-10-23 2015-10-15 Suzanne P. Hassell Method and device for simulating network resiliance against attacks
US20160036829A1 (en) * 2014-08-01 2016-02-04 Wombat Security Technologies, Inc. Cybersecurity training system with automated application of branded content
US20170270077A1 (en) * 2014-09-25 2017-09-21 Huawei Technologies Co., Ltd. A server for providing a graphical user interface to a client and a client
US9473522B1 (en) * 2015-04-20 2016-10-18 SafeBreach Ltd. System and method for securing a computer system against malicious actions by utilizing virtualized elements
US20170034205A1 (en) * 2015-07-31 2017-02-02 Siemens Corporation System and Method for Cyber-Physical Security
US20180124051A1 (en) * 2016-07-14 2018-05-03 Huawei Technologies Co., Ltd. Response Method and System in Virtual Network Computing Authentication, and Proxy Server
US20180190146A1 (en) * 2016-12-30 2018-07-05 Fortinet, Inc. Proactive network security assesment based on benign variants of known threats
US20180233139A1 (en) * 2017-02-14 2018-08-16 Microsoft Technology Licensing, Llc Intelligent digital assistant system
US20190155916A1 (en) * 2017-11-22 2019-05-23 Facebook, Inc. Retrieving Content Objects Through Real-time Query-Post Association Analysis on Online Social Networks
US20190171822A1 (en) * 2017-12-01 2019-06-06 KnowBe4, Inc. Systems and methods for aida campaign controller intelligent records
US20190341055A1 (en) * 2018-05-07 2019-11-07 Microsoft Technology Licensing, Llc Voice identification enrollment
US20190347585A1 (en) * 2018-05-09 2019-11-14 Microsoft Technology Licensing, Llc Increasing usage for a software service through automated workflows

Also Published As

Publication number Publication date
US20190362318A1 (en) 2019-11-28
US11216354B2 (en) 2022-01-04
US20190360815A1 (en) 2019-11-28
US20200026742A1 (en) 2020-01-23
US20200026696A1 (en) 2020-01-23
US20190361785A1 (en) 2019-11-28

Similar Documents

Publication Publication Date Title
US20220083446A1 (en) Depicting Outcomes of a Decision
US11310261B2 (en) Assessing security risks of users in a computing network
JP7358564B2 (en) Deploy dynamic policies and access visibility to detect threats
US20200349281A1 (en) Dynamic management of data with context-based processing
US11403684B2 (en) System, manufacture, and method for performing transactions similar to previous transactions
US20200267162A1 (en) Mechanisms for anomaly detection and access management
CN112703712B (en) Supervised learning system for identity hazard risk calculation
CN104040550B (en) Integrated security strategy and incident management
US10862843B2 (en) Computerized system and method for modifying a message to apply security features to the message's content
JP6255115B2 (en) Promotion of same-day payment transactions
US9047336B2 (en) Reputation based access control
US20180033089A1 (en) Method and system for identifying and addressing potential account takeover activity in a financial system
US8826154B2 (en) System, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface
WO2017128869A1 (en) Information processing method, first terminal, second terminal, and server
US20120011451A1 (en) Selective screen sharing
US20140331119A1 (en) Indicating website reputations during user interactions
CA2952563A1 (en) System and method for managing behavior
US11477244B2 (en) Method and system for data loss prevention management
US20130191878A1 (en) Accessing enterprise resource planning data from a handheld mobile device
US11805096B2 (en) Technique for restricting access to information
Rigdon Dictionary of computer and Internet terms (Vol. 1)
US20210149982A1 (en) Data processing systems and methods for dynamically determining data processing consent configurations
Knake Weaponizing Digital Trade
US20160335717A1 (en) Systems and methods for providing subsequent payment options for identified eligible users
RU2623808C2 (en) Method of application of safety policies for computer safety

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION